The Internet has become the de-facto medium for many enterprises to carry out their business functions. By relying on public-key encryption to ensure confidentiality and authenticity of data, employees and customers are able to use a variety of public channels via web browsers, emails and mobile apps to send and receive sensitive information securely. However, this promise of confidentiality and authenticity is being compromised with the advent of quantum computers. With the potential rise of exponentially powerful quantum computing, current data encryption algorithms are not resilient enough for such hidden quantum cyberattacks, specifically harvest-now decrypt-later (HNDL) attacks, resulting in data leaks and undermining privacy.
The technology owner has leveraged on their proprietary post-quantum cryptography (PQC) implementation to develop a software module to provide and enhance existing end-to-end data encryption, ensuring resilience to quantum cyberattacks while maintaining confidentiality and authenticity of data. By utilising Key Encapsulation Mechanism (KEM) and JavaScript, it is compliant with evolving cybersecurity standards while being lightweight and dynamic enough to be loaded and executed without installation or configuration. This enables the technology solution to be flexible, scalable and user-friendly.
The technology owner is currently working with an organisation to further develop industrial applicable solutions. The technology owner is seeking collaboration partners, such as system integrators, independent software vendors, solution providers and end-users, who require an enhanced and compliant data encryption for the finance, government and healthcare industries.
The technology solution, in a form of a software module, leverages on their proprietary PQC cryptographic implementation to secure confidentiality and authenticity of data. Some specifications of the module include:
With the above specifications, this quantum-resistant software solution has the following features:
ith the potential rise of quantum cyberattacks, especially HNDL attacks, private information and data can potentially be vulnerable and compromised. Hence, any application transmitting sensitive data via web browser or mobile applications requiring heightened cybersecurity will greatly benefit from it. Examples of such applications include, but not limited to:
The software module protects against quantum threats, such as HNDL attacks, by leveraging on their proprietary PQC encryption implementation, ensuring secure end-to-end encryption of data between web browser and organisation. Utilising a hybrid combination of ML-KEM-768 and AES FIPS 197 algorithms, it provides compliance to NIST standards to be quantum resilient. With the solution deployed on JavaScript, it is dynamic and integrates seamlessly with existing infrastructure backend, maintaining existing end-user experience. The software is efficient and resource light while being scalable. With the adoption of such technology solution, it enables organisation to pre-emptively fortify their digital security for an incoming post-quantum world.